5
CVSSv2

CVE-2012-2213

Published: 28/04/2012 Updated: 11/04/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Squid 3.1.9 allows remote malicious users to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher is unable to provide a squid.conf file for a vulnerable system, and the observed behavior is consistent with a squid.conf file that was (perhaps inadvertently) designed to allow access based on a "req_header Host" acl regex that matches www.uol.com.br

Vulnerable Product Search on Vulmon Subscribe to Product

squid-cache squid 3.1.9

Github Repositories

This is a stub project to store some PoC code for bypassing proxy controls

proxy_bypass This is a proof of concept for the following vulnerabilities: 1) Squid 319 (CVE-2012-2213) - CONFIRMED 2) McAfee Web Access Gateway (CVE-2012-2212) - NOT CONFIRMED, but likely Feel free to test yourself and let me know what you find More details about these issues are on the Spiderlabs Blog: blogspiderlabscom/2012/05/bypass-vulnerabilities-in-squid-an